Figure 1. Hospital Ontology
Figure 2. Context Hierarchy Tree
Figure 3. Context Hierarchy Tree with Instance
Figure 4. Algorithm for generation of LDSC
Figure 5. Algorithm SCCE for Evaluation of Semantic Context Constraints
Figure 6. Algorithm for Semantic Enforcement of Access Control Policy
Table1. Inference Rule extracted from Ontology
참고문헌
- Weiser, M., "Hot Topics: Ubiquitous Computing", IEEE Computer, 1993.
- Kumar, N., Chafle, G., "Context Sensitivity in Role-based Access Control", Operating Systems Review, Vol. 36, No. 3, IBM Journal, 2002.
- Wang, X.H., Xhang, D.Q., Gu, T., and Pung, H.K., "Ontology Based Context Modeling and Reasoning using OWL", in PerCom2004 Annual Conference on Pervasive computing and Communications Workshop, 2004.
- Rastogi et al, "Access Control over Uncertain Data", PVLDB '08, 2008.
- P. Balbiani, "Acces control with uncertain surveillance", International Conference on Web Intelligence, 2005.
- Dalvi et al, "Efficient query evaluation on probabilistic databases", VLDB J, 2007.
- Sandhu, R., Ferraiolo, D., and Kuhm, R., "The NIST Model for Role-Based Access Control: Towards A Unified Standard", in Proceedings of the fifth ACM workshop on Role-based access control, 2000.
- Ranganathan, R, Campbell R.H., "An Infrastructure for context-awareness based on first-order logic", Personal and Ubiquitous Computing, Vol. 7, Issue 6, 2003.
- R. Sandhu, P. Samarati., "Access control: principles and practice", IEEE Communication Magazine, vol. 32, 1994.
- Qin, L., Atluri, V., "Concept-level Access Control for the Semantic Web", in ACM Workshop on XML Security, 2003.
- Byun, J., Bertino, E., Li, N., "Purpose-based Access Control of Complex Data for Privacy Protection", SACMAT, pp102-110, 2005.